Access Contested: Theory and Analysis

Page 176

176

Nart Villeneuve and Masashi Crete-Nishihata

International Studies Association Convention, February 2010, New Orleans, LA; Jose Nazario, “Politically Motivated Denial of Service Attacks,” in The Virtual Battlefield: Perspectives on Cyber Warfare, ed. Christian Czosseck and Kenneth Geers (Amsterdam: IOS Press, 2009), 163–181. 59. Deibert, Rohozinski, and Crete-Nishihata, “Cyclones in Cyberspace.” 60. Ronald Deibert and Rafal Rohozinski, “Control and Subversion in Russian Cyberspace,” in Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace, ed. Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge, MA: MIT Press, 2010); Information Warfare Monitor, Tracking GhostNet: Investigating a Cyber Espionage Network, March 29, 2009, http://tracking-ghost.net; Information Warfare Monitor and Shadowserver Foundation, “Shadows in the Cloud: An Investigation into Cyber Espionage 2.0,” April 6, 2010, http://shadows-in-the -cloud.net; Nart Villeneuve, “Vietnam and Aurora,” Nart Villeneuve Malware Explorer, April 5, 2010, http://www.nartv.org/2010/04/05/vietnam-aurora. 61. Mike Johnson, “Georgian Websites under Attack—Don’t Believe the Hype,” Shadowserver Foundation, August 12, 2008, http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20080812. 62. For further analysis of the global prevalence and effect of DDoS attacks against civil society groups, see Hal Roberts, Ethan Zuckerman, and John Palfrey, “Interconnected Contests: Distributed Denial of Service Attacks and Other Digital Control Measures in Asia,” chapter 7 in this volume.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.